Denial of service in Wireshark - CVE-2017-9616
Published: June 20, 2017 / Updated: March 24, 2022
Vulnerability identifier: #VU7128
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2017-9616
CWE-ID: CWE-400
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Wireshark.org
Affected software:
Wireshark
Wireshark
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to memory exhaustion when processing malicious media files. A remote attacker can trick the victim into opening a specially crafted MP4 data, trigger an error in the dissect_mp4_box() function in 'epan/dissectors/file-mp4.c', consume excessive memory and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists due to memory exhaustion when processing malicious media files. A remote attacker can trick the victim into opening a specially crafted MP4 data, trigger an error in the dissect_mp4_box() function in 'epan/dissectors/file-mp4.c', consume excessive memory and cause the system to crash.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-9616
Install update from vendor's website.